Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Privacy (2)
- Security (2)
- Abuse Detection (1)
- Abuse Detection and Prevention (1)
- Data verification (1)
-
- Facebook Abuse (1)
- Fraudulent reviews (1)
- Friend Spam (1)
- Geosocial networks (1)
- Machine Learning (1)
- Malware (1)
- Mobile networks (1)
- Online Social Networks (1)
- Online social network (1)
- Public safety (1)
- Search Rank fraud apps (1)
- Smart City (1)
- Trajectory (1)
- Video Authentication (1)
- Wearable sensors (1)
- Wireless sensor networks (1)
Articles 1 - 3 of 3
Full-Text Articles in Systems Architecture
Detection And Prevention Of Abuse In Online Social Networks, Sajedul Karim Talukder
Detection And Prevention Of Abuse In Online Social Networks, Sajedul Karim Talukder
FIU Electronic Theses and Dissertations
Adversaries leverage social networks to collect sensitive data about regular users and target them with abuse that includes fake news, cyberbullying, malware distribution, and propaganda. Such behavior is more effective when performed by the social network friends of victims. In two preliminary user studies we found that 71 out of 80 participants have at least 1 Facebook friend with whom (1) they never interact, either in Facebook or in real life, or whom they believe is (2) likely to abuse their posted photos or status updates, or (3) post offensive, false or malicious content. Such friend abuse is often considered …
Data Verifications For Online Social Networks, Mahmudur Rahman
Data Verifications For Online Social Networks, Mahmudur Rahman
FIU Electronic Theses and Dissertations
Social networks are popular platforms that simplify user interaction and encourage collaboration. They collect large amounts of media from their users, often reported from mobile devices. The value and impact of social media makes it however an attractive attack target. In this thesis, we focus on the following social media vulnerabilities. First, review centered social networks such as Yelp and Google Play have been shown to be the targets of significant search rank and malware proliferation attacks. Detecting fraudulent behaviors is thus paramount to prevent not only public opinion bias, but also to curb the distribution of malware. Second, the …
Trajectory Privacy Preservation In Mobile Wireless Sensor Networks, Xinyu Jin
Trajectory Privacy Preservation In Mobile Wireless Sensor Networks, Xinyu Jin
FIU Electronic Theses and Dissertations
In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". …